when recovering public keys for this signature posted here: https://bitcointalk.org/index.php?topic=996318.msg51506455#msg51506455 i come up with 2 public keys Q using Q = r-1(sR-eG) where r and s are from signature (r,s) and R is a point calculated from x = r + jn j∈[0,1] and n and G are curve parameters. The problem is that when i use first Q with signature, i can verify the signature. but when i use the second Q the verification fails. so i am wondering whether this is normal or is my calculations incorrect (missing a step)? can you post the steps or the two public keys, it would be easier to tell you what went wrong. /KX
|
|
|
hi there and thanks for your help and consideration! I am new to bitcoin. I was trying to send myself bitcoin from my Electrum wallet to another Electrum wallet I created. The money is not showing up in any of my wallets with the seeds I put in. I have an address and a transaction ID but I don't know how to access it since none of my wallets show the money as received, only as sent and with a balance of $0. If someone can please help me I would greatly appreciate it. which version of Electrum did you use and where did you download it. There are several sites that lets you download a fake version If you have the wallet you sent from, check the tx id on blockchain.com, then you know where you bitcoin went /KX
|
|
|
I was talking about reversing hashes. read again.
The post you quoted was about rainbow tables. Not about reverting an hashing algorithm. So.. either you are incapable of reading or you don't understand the concept behind rainbow tables. Both would be pretty sad, given that you are running a 'professional' recovery service (a.k.a. some GPUs at home?). Computing rainbow tables has nothing to do with reverting hashes. Period. I do my homework, dont worry. And I dont need to earn signature points.
That's good. First do everything for school before dedicating yourself to your hobby. BTW.. what are signature points? And how do i get them? So could you please make up your mind, you called my service professional then GPU at home. Dont drink too much redbull, your testerone level seem a bit high. I dont need to prove myself to a paid signature points harvester, And thanks for the free advertising. /KX
|
|
|
You consider all possible combinations but there are backdoors, I have recovered 11+ charachters for clients which you said would not be possible. Lets face it, math is not the only factor here, you have to be lucky sometimes too That's why i said that it is a generic answer which itself is not true. Under some rare circumstances, yes.. of course it can be recovered. But just because i recovered a password ' 123456789012345678901234567890', it doesn't mean that every 30 char passwords can be cracked (which your statement implied). I've heard there is a soft to extract password's hash from wallet.dat and then use Rainbow tables (which are already computed and ready for everyone on Web) to find out the relevant combination of characters. This way the necessary time will be greatly reduced.
You probably think of brain wallets (rainbow table) as there is no such thing determinating combination of characters from a hash, its not reversable. The hashing algorithms does not have to be reversible for rainbow tables to be applicable. The concept of rainbow tables is that you trade off computing power for storage space by precalculating the a big amount of combinations for further look-ups in this table. While this is not applicable to a single wallet file, i still wonder why you have such a misunderstanding regarding rainbow tables. Especially since you claim to be a professional password recovery service I was talking about reversing hashes. read again. I do my homework, dont worry. And I dont need to earn signature points. /KX
|
|
|
snip I don't think this can be brute forced in a reasonable amount of time..
I've heard there is a soft to extract password's hash from wallet.dat and then use Rainbow tables (which are already computed and ready for everyone on Web) to find out the relevant combination of characters. This way the necessary time will be greatly reduced. You probably think of brain wallets (rainbow table) as there is no such thing determinating combination of characters from a hash, its not reversable. /KX
|
|
|
yes, if the password is less than 10 characters you can, otherwise it will take some time
This is a very generic answer.. and i feel like this isn't completely true. If OP has absolutely no clue what the password could be and the charset is relatively big, i don't think a password with 9 chars can be cracked in a short amount of time. A 9 char password with (1) lowercase, (2) uppercase, (3) numbers and (4) special characters has a char set of 95. This means there are 95^9 = 630.249.409.724.609.375 combinations. I don't think this can be brute forced in a reasonable amount of time.. You consider all possible combinations but there are backdoors, I have recovered 11+ charachters for clients which you said would not be possible. Lets face it, math is not the only factor here, you have to be lucky sometimes too I was on a security panel in Malta and our conclution was, yes mathematically brute force is impossible, but there is no such thing as impossible in forensics... /KX
|
|
|
-snip-
He is right, there are tools where you can read the drive with a magnetic device, so even a full format and 5 formats, still the data can be read with special hardware /Bartek Those tools are useless for hard drives with its " Master Boot Record" all zeroed, ETFbitcoin described his term " full format" like " Zero Fill", so he really meant zero fill. It's also known as " Low level formatting". Well, good luck then, you can format your drive 5 times, its still possible to extract info. You can turn off your computer, I can still recover data from your RAM, yes RAM. Please read some more on the topic before you spam with nonsense Bartek first of all the guy should make some research if the address is empty before making any fuzz. check your address on blockchain.com or import a view only to see balance. /KX
|
|
|
Hello,
I bought many bitcoins back 2013 and since then my laptop went completely broken, I did do a backup, but its no where to find. So I cant find my Bitcoin Core wallet anywhere anymore, but I have the password for it and the last address where the bitcoins came to my wallet. (didn't do any other transactions with that wallet) Is it possible to recover the wallet with this infromation? If it is how its possible? Thank you all for the answers and sorry if this had been asked before in this forum (I couldn't find similiar topic as this)
your best bet is to look for backups (maybe it was a blockchain.info) wallet, then you can recover a copy of it /KX
|
|
|
Please move this thread to Bitcoin Technical Support, I'm sure people there will help you. And tell us if you still have the .dat file or if you still can remember the length of your password likewise the some letters of it. Also, would you share if how much coins does this wallet has? yes, if the password is less than 10 characters you can, otherwise it will take some time /KX
|
|
|
To begin with, I don't have deeper technical knowledge about the blockchain as many others here have. Which is why I would like to get opinion for a solution which I think might be possible to reduce the blockchain size. Again, I am no expert and just expressing my views to get some better reviews and understanding of the blockchain.
Considering that the size of blockchain has already crossed 200GB+ I think the simple solution here would be to archive this data from the Blockchain and store it on some particular locations from where the archival is easy to access.
Let us consider that we have archived all the blocks until 200GB and have stored on some secure place. Also, we have attached a hash/signature to the archive and modified the consensus such that every new block that is generated includes a hash/signature from the archive. So now instead of validating all the previous blocks, the miner will validate only the hashes of archived blockchain, previous block and the current block.
This will save the 200GB of data that a miner has to validate and reduce the size of the blockchain. I know there must be some flaws in this system. Let me know in the comments.
well if core developers inteoduced schnorr signatures you would save 25% space /kx
|
|
|
I have a ledger nano s with 24 seed word. I got a ledger nano x, and entered that 24 seed word.
Now all my private keys are on both ledger devices.
My question is, let’s say I generate a new Litecoin wallet on my new ledger nano x. I send 1 LTC to that device. Is the private key to that wallet also on my original nano s device?
So let’s say I get a third device and enter that 24 seed word? Is that new Litecoin wallet on there?
So confused.
The coins are actually not on your ledger, they are on the blockchain. So you need to connect the ledger to a chain in order to "get" the coins, the ledger just holds your keys/words. The ledger is just used to access your address. /KX
|
|
|
I was laying in bed last night and remembered... "oh crap, I had a miner running on my PC back in 2013, wonder if there are any coins stashed on my computer" Did a quick search of my archive hard drive and came across a word file named 'bitcoin' that contains a phrase, 34 characters long, starts with '15eax'
I have been searching the internet and these forums to dry and decipher what this code is, and how to import it. Forgive my lack of knowledge in this field, I have a 5yo and have not been on my computer in far too long, the industry has surpassed my current knowledge level. Thanks for any info.
Even if you formatted the drive 10 times, its possible to recover data. You just need to hire a pro. If you mined in the early days and were lucky to get a block, then you probably have 50 or 25 BTC in the wallet.dat file. If you know you still have the drive, then stop using it and get a service to recover it for you /KX
|
|
|
Another curiosity that is driving me crazy is the secure element that is put into the specialized chips of hardware wallets. What makes the secure element so secure and makes it stand exceptional from others?
We are not going to assist you in compromising a wallet, sorry. LOL ,why would I want to compromise a trezor ? Obviously I am not asking for component used to build the secure element. I am just asking for high level context. For example: the secure element may use a cryptographic hash function that makes the chip secure and makes the hardware wallet sign the transactions with greater safety. P.S: I am not such a genius that I can compromise wallets by writing scripts/codes. I just tend to grasp knowledge about anything that grabs my interest and bitcoin is one of them. Maybe you are on a powertrip.
I don't even know what powertrip means Then read https://www.ledger.com/2019/03/11/our-shared-security-responsibly-disclosing-competitor-vulnerabilities//KX
|
|
|
My aunt's daughter Died and there is 13 btc in hardware wallet
she left 2 kids and we my family know nothing about btc or this field i help her to buy this coins
i have her laptop she use to open the wallet from and we have the bill that we buy Ledger Nano
so what we can do to solve this miss
Whatever you do, you should have a professional guide you through the different steps involved. First, if you just hit random pin code tries as some people suggested, you will be locked out from the Ledger as it has built in security, after a few wrong tries the time for you to be allowed to enter the pin again with increase exponentially. Second, the moment you sell and move the funds, (we are talking over around 100k) you would need to know that you have to pay tax in your jurisdiction, depending on the time of purchase and location of your jurisdiction. Knowing that you should be aware that in some cases the tax could be up to 40% of profit made. Finally, there are several ways to access the funds from the ledger, and whatever you do, dont use any online services, as you can be scammed or fooled to enter information that later can be used to extract and steal the funds. You should download the official ledger connect software from https://www.ledger.com/ that will help you access the funds. The only way to access it is if you have the pin. If you dont have the pin, but instead a 12 or 24 word list, you can use that on many different wallets, of which one is Electrum. You can download it from http://electrum.org/#downloadIn order to "cash" out the funds, you should setup an account on a exchange, depending on your jurisdiction coinbase (US), bitstamp (EU) or binance (Asia). Also, the ledger could hold funds that doesnt always show up in the software, you would need to use tools like etherscan.io or blockchain.com to see if it holds other coins like Bitcoin Cash or airdrops. good luck and dont get scammed /KX
|
|
|
As said the title; Is it possible to know if two or more addresses are related to one wallet? and if from transactions i can figure possible connection (same wallet) between addresses.
I post this here because i think it's a beginner question, no?
Just from the transaction, depending on how you execute the transactions and if you use any interpolating xfers, maybe. If you created a wallet from a seed, and use different addresses from that seed, and someone, lets say law enforcement gets your seed, then yes, they can prove the different addys are connected. /KX
|
|
|
Hi Everyone,
I found an old wallet.dat on a HDD. I'm trying to figure out how to identify the type of coins that are inside. Looks like a lot of alt coin are using "wallet.dat" just like bitcoin. I found by reading online that addresses are written in plain text inside the file, and indeed I can see next to "name=" some adresses.
Apparently, the first character of the address could identify the type of coin. In my case it's a "S".
Does anyone know which "blockchain" the prefix S corresponds to? What is the best way to find the coin associated with this wallet?
Thank you
You can use pyethrecover that will scan your wallet.dat file for addresses. You can then create a tool that will parse blockchain.info for balances automatically. Its pretty simple /KX
|
|
|
Yeah its about some upper/lower case letter something like this - TodayIsTuesday2019 so I'm missing upper case letter or variation - IsItTuesdayToday2019...
Which app you are recommending for brute force? And is it possible to brute force second password on MultiBit/Blockchain.info with that app?
Thanks.
In this case, btcrecover should find the correct passphrase in a very short amount of time. For x letter in your password, it needs to check 2 x variations. With 10 letter, there are 1024 possibilities (which is a really low number for bruteforcing). This would probably run through in less than 5 seconds. btcrecover is extremly slow for wider searches, You need to have custom made version that runs on GPU, then you can reach over 500k guesses per second. /KX
|
|
|
|